Challenge - Weak hash function

Introduction

This is a reverse engineering challenge was developed for Windows.If you enjoy low level reverse engineering and cryptography challenges you should have a good time.

Scenario

The IT team of a secret organization was tasked to create a hashing function. The next day the algorithm was implemented in all the authentication systems of the secret organization.

You have been tasked by a competing organization to find vulnerabilities within the authentication system of a software.

Challenge

This program accepts a password of 16 characters. The goal is to find a valid password to get the message "Access granted.".A cryptographically weak hash function was used for this challenge, there are many passwords to authenticate.